[1]
P. Król, D. Marek, and J. Smołka, “Analysis of user behavior and authorization methods in context of mobile devices security ”, J. Comput. Sci. Inst., vol. 6, pp. 34–41, Mar. 2018.